CVE-2008-7062
- EPSS 3.94%
- Veröffentlicht 25.08.2009 10:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unrestricted file upload vulnerability in admin/index.php in Download Manager module 1.0 for LoveCMS 1.6.2 Final allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct reques...
- EPSS 3.87%
- Veröffentlicht 31.12.2008 11:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Directory traversal vulnerability in system/admin/images.php in LoveCMS 1.6.2 Final allows remote attackers to delete arbitrary files via a .. (dot dot) in the delete parameter.
CVE-2008-3509
- EPSS 15.1%
- Veröffentlicht 07.08.2008 20:41:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
LoveCMS 1.6.2 does not require administrative authentication for (1) addblock.php, (2) blocks.php, and (3) themes.php in system/admin/, which allows remote attackers to change the configuration or execute arbitrary PHP code via addition of blocks, an...
CVE-2007-1148
- EPSS 2.6%
- Veröffentlicht 02.03.2007 21:18:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
PHP remote file inclusion vulnerability in install/index.php in LoveCMS 1.4 allows remote attackers to execute arbitrary PHP code via a URL in the step parameter.
- EPSS 4.67%
- Veröffentlicht 02.03.2007 21:18:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Multiple directory traversal vulnerabilities in LoveCMS 1.4 allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the step parameter to install/index.php or (2) the load parameter to the top-level URI.
CVE-2007-1150
- EPSS 0.62%
- Veröffentlicht 02.03.2007 21:18:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unrestricted file upload vulnerability in LoveCMS 1.4 allows remote authenticated administrators to upload arbitrary files to /modules/content/pictures/tmp/.
CVE-2007-1151
- EPSS 0.52%
- Veröffentlicht 02.03.2007 21:18:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Cross-site scripting (XSS) vulnerability in LoveCMS 1.4 allows remote attackers to inject arbitrary web script or HTML via the id parameter to the top-level URI, possibly related to a SQL error.